<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 Network address translation through an internal network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093335#M392523</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Wouldn't the static nat read static(inside,outside) 68.68.68.222 192.168.2.60 netmask 255.255.255.255 ?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is correct "static(inside,outside)" if you want to traverse traffic to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 20 Jan 2013 17:01:20 GMT</pubDate>
    <dc:creator>rizwanr74</dc:creator>
    <dc:date>2013-01-20T17:01:20Z</dc:date>
    <item>
      <title>ASA 5510 Network address translation through an internal network.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093329#M392517</link>
      <description>&lt;P&gt;Is it possible to perform static Nat's through an internal network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's my situation I have a ASA 5510 with a public outside interface (let’s call it 68.68.68.1), and I have an inside private IP address (192.168.1.2/24). The inside IP address leads to a 4900m with that interface being configured with a 192.168.1.1 (no switching). On the 4900 M I have several VLANs one of them is an internal DMZ of sorts. (192.168.2.0/24). Within this DMZ network are several Web servers which need to be associated a public IP address (68.68.68.x). &lt;/P&gt;&lt;P&gt;Every time I configure a static Nat to associating a public IP address with an internal IP address within the DMZ, packet Tracer on the ASA informs me that the packet gets dropped at the static Nat and I cannot figure out why this is so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Safe it to say my question still stands is it possible to Nat (68.68.68.222 to and 92.168.2.60) given the configuration above, and how would I go about configuring in such the manner above so that I acn apply static nat through the 192.168.1.0 network to reach the 192.168.2.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help on this matter is greatly appreciated. Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093329#M392517</guid>
      <dc:creator>michaelzahn</dc:creator>
      <dc:date>2019-03-12T00:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093330#M392518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That can be easioy done, All you need is:&lt;BR /&gt;&lt;BR /&gt;1) your static translation&lt;BR /&gt;2) an ACE allowing the incoming traffic&lt;BR /&gt;3) a route from the firewall to the switch for the 192.168.2.0 network.&lt;BR /&gt;&lt;BR /&gt;For more help on configuring that, please share the version of your ASA or even better your actual config.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 15:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093330#M392518</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-01-20T15:45:11Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Network address translation through an internal network</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093331#M392519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paste results of:&lt;/P&gt;&lt;P&gt;sh int ip brief&lt;/P&gt;&lt;P&gt;sh nameif&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;sh run global&lt;/P&gt;&lt;P&gt;and also packet tracer result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Michal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 15:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093331#M392519</guid>
      <dc:creator>Michal Garcarz</dc:creator>
      <dc:date>2013-01-20T15:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093332#M392520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes it is possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you have an ACL configured on your outside interface on your ASA, with a name: outside-allow-in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-allow-in extended permit ip any host 68.68.68.222&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now this ACL is applied on the outside interface on your ASA as shown below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside-allow-in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now create a static-nat as shown below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 68.68.68.222 192.168.2.60 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at last please make sure to add a static-route to push traffic "192.168.2.0 netmask 255.255.255.0" to peering address i.e. 192.168.1.1 as shown below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;made correction.&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Rizwan Mohamed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 16:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093332#M392520</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2013-01-20T16:00:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Network address translation through an internal network</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093333#M392521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wouldn't the static nat read static(inside,outside) 68.68.68.222 192.168.2.60 netmask 255.255.255.255 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 16:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093333#M392521</guid>
      <dc:creator>michaelzahn</dc:creator>
      <dc:date>2013-01-20T16:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093334#M392522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your case the static is (inside, outside). But for a "real" DMZ you should consider to terminate the VLan on a subinterface on the ASA to have more control over the network that is directly reached through the internet.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 16:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093334#M392522</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-01-20T16:33:41Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Network address translation through an internal network</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093335#M392523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Wouldn't the static nat read static(inside,outside) 68.68.68.222 192.168.2.60 netmask 255.255.255.255 ?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is correct "static(inside,outside)" if you want to traverse traffic to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 17:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093335#M392523</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2013-01-20T17:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093336#M392524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The following was applied &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 68.68.68.222 192.168.2.60 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside DMZ-network(which is 192.168.2.0 255.255.255.0 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I try to access the server 192.168..2.60 from the outside I do not get a response.&amp;nbsp; I ran packet Tracer on the firewall when I apply interface outside with source IP address 68.68.68.2222 destination IP address 192.168.2.60 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; &lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt; &lt;A href="#"&gt; &lt;/A&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt; Config &lt;/P&gt;&lt;P&gt;static (inside,outside) 68.68.68.222 192.168.2.60 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;match ip inside host 192.168.2.60 outside any&lt;/P&gt;&lt;P&gt;static translation to 68.68.68.222&lt;/P&gt;&lt;P&gt;translate_hits = 91, untranslated_hits = 12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 17:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093336#M392524</guid>
      <dc:creator>michaelzahn</dc:creator>
      <dc:date>2013-01-20T17:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093337#M392525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;more information&amp;nbsp; as requested&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;csc# sh int ip br&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP-Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OK? Method Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&lt;/P&gt;&lt;P&gt;Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.2&amp;nbsp;&amp;nbsp; YES CONFIG up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.2.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES CONFIG up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.12.1&amp;nbsp;&amp;nbsp;&amp;nbsp; YES CONFIG up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Ethernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.68.68.1&amp;nbsp;&amp;nbsp; YES CONFIG up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Internal-Control0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 127.0.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Internal-Data0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unassigned&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; YES unset&amp;nbsp; up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; up&lt;/P&gt;&lt;P&gt;Management0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.19.1&amp;nbsp;&amp;nbsp;&amp;nbsp; YES manual administratively down down&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;csc-ssm# sh nameif&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security&lt;/P&gt;&lt;P&gt;Ethernet0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&lt;/P&gt;&lt;P&gt;Ethernet0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; %^&amp;amp;*%$&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&lt;/P&gt;&lt;P&gt;Ethernet0/2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; @#$%&amp;amp;*()&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30&lt;/P&gt;&lt;P&gt;Ethernet0/3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/P&gt;&lt;P&gt;Management0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; management&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nat0&lt;/P&gt;&lt;P&gt;nat (inside) 1 serverNET 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 Server 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.8.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 CorpVPN 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Eng) 0 access-list ENG_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Eng) 1 172.16.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (WiFi-Guest) 1 192.168.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (ENG) 2 172.16.2.10-172.16.2.50 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 17:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093337#M392525</guid>
      <dc:creator>michaelzahn</dc:creator>
      <dc:date>2013-01-20T17:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093338#M392526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post the output form ACL "outside_access_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 17:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093338#M392526</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2013-01-20T17:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093339#M392527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the hold ouside_access_in currently actived.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.68.68.1 (interface)&amp;nbsp;&amp;nbsp;&amp;nbsp; icmpicmp/echo&lt;/P&gt;&lt;P&gt;icmp/echo-reply&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&amp;nbsp;&amp;nbsp;&amp;nbsp; Default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.68.68.1&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp/time-exceeded&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&amp;nbsp;&amp;nbsp;&amp;nbsp; Default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.68.68.1&amp;nbsp;&amp;nbsp;&amp;nbsp; ip&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&amp;nbsp;&amp;nbsp;&amp;nbsp; Default&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.68.68.1&amp;nbsp;&amp;nbsp;&amp;nbsp; icmp/unreachable&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&amp;nbsp;&amp;nbsp;&amp;nbsp; Default&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp; ip&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&amp;nbsp;&amp;nbsp;&amp;nbsp; Default&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9&amp;nbsp;&amp;nbsp;&amp;nbsp; True&amp;nbsp;&amp;nbsp;&amp;nbsp; any&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.68.68.222&amp;nbsp;&amp;nbsp;&amp;nbsp; ip&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&amp;nbsp;&amp;nbsp;&amp;nbsp; Default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 17:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093339#M392527</guid>
      <dc:creator>michaelzahn</dc:creator>
      <dc:date>2013-01-20T17:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Network address translation through an internal net</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093340#M392528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;make sure that you&lt;BR /&gt;&lt;BR /&gt;a) don't have the needed communication in your nat0-ACL&lt;BR /&gt;b) have "inspect icmp" in your service policy if you only test with icmp/echo.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 18:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-network-address-translation-through-an-internal-network/m-p/2093340#M392528</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-01-20T18:31:14Z</dc:date>
    </item>
  </channel>
</rss>

